adplus-dvertising
frame-decoration

Question

The digest created by a hash function is normally called a

a.

Modification detection code (MDC)

b.

Modify authentication connection

c.

Message authentication control

d.

Message authentication cipher

Answer: (a).Modification detection code (MDC)

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The digest created by a hash function is normally called a

Similar Questions

Discover Related MCQs

Q. Message confidentiality is using

Q. A sender must not be able to deny sending a message that was sent, is known as

Q. To preserve the integrity of a document, both the document and the fingerprint are

Q. When the data must arrive at the receiver exactly as they were sent, its called

Q. The message digest needs to be

Q. In Message Integrity, the message digest needs to be kept

Q. In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of

Q. The Message confidentiality or privacy means that the sender and the receiver expect

Q. The message must be encrypted at the sender site and decrypted at the

Q. The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.

Q. Network Security provides authentication and access control for resources.

Q. Which is not an objective of network security?

Q. Which of these is a part of network identification?

Q. The process of verifying the identity of a user.

Q. A concern of authentication that deals with user rights.

Q. CHAP stands for?

Q. Security features that control that can access resources in the OS.

Q. An algorithm in encryption is called _____________

Q. The information that gets transformed in encryption is ____________

Q. If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________